This course
This Course was presented to you by TCSC London Academy and the instructor Mr Izem Iferoudjene.
This video aims to summarize the Modules and topics covered within this training.
Module one is an Introduction to of Cyber Security world, it sets the basic concepts and key definitions.
First lesson in module one is entitled: Overview of Cybersecurity, it responds to the question : What is Cybersecurity? And What is the role of The CIA triad, it also introduces Cyber Security
Approach adopted by enterprises and finally explains the notion of Cyber Security
Domains.
In lesson 2 of the same module, we covered the Importance of Cybersecurity and stakeholders involved in Cybersecurity
Lesson 3, covers Key Concepts and Terminology, and a brief introduction to Threat Agents
Finally Lesson 4, explains Threat intelligence and its Key Components.
In the second module entitled Cyber Threats, we started with Types of Cyber Threats in Lesson 1, Examples of known threats in Lesson 2, Impact of Cyber Threats Real-World Examples in Lesson 3 and 4
Module 3, is dedicated to Risk Management it covers a Definition of risk management in Lesson 1, Risk Assessment in lesson 2, Risk Management Strategies in Lesson 3, and Risk Mitigation Strategies in its fourth lesson.
Module 4, Entitled Security Strategies it covers the following topic:
Lesson 1: Defence in Depth
Lesson 2: Access Control
Lesson 3: Identity and Access Management (IAM)
Lesson 4: Security Monitoring and Analysis
Lesson 5: Zero trust Strategy
In Module 5, we discussed Norms and Regulations
We started in Lesson 1 with an Introduction to Norms and Regulations.
Lesson 2: is dedicated to Compliance Frameworks
Lesson 3: Introduces Cybersecurity Laws and Regulations
And finally for this module we covered Policies, Procedures, Standards, Baselines, and Guidelines in Lesson 4.
After introducing the previous notions and Key concepts, in Module 6, we discussed Incident Management.
In Lesson 1, we introduced the Incident response plan (IRP).
Lesson 2, covers the Incident response Team (IRT)
We also covered Incident response phases in Lesson 3, and in Lesson 4, we covered Post-Incident Analysis and Improvement.
Module 7, Entitled IoT Security covers the following topics:
Lesson 1: Introduction to IoT Security
Lesson 2: Connectivity technologies in IoT
Lesson 3: Challenges Related to Securing IoT Devices
Lesson 4: Strategies and best practices for Securing IoT
Eighth Module is completely dedicated to the Artificial Intelligence Challenges in Cybersecurity
Lesson 1, aims to introduce the Key concepts of AI technologies.
Lesson 2, covers the Relationship between AI and Cybersecurity.
Lesson 3, Unveils AI Challenges and Considerations, And Lesson 4 explains the importance of Balancing AI and Human Expertise in order to better respond to Cybersecurity Challenges.
In Our final module, We covered a key Element in the context of Globalisation, explaining hoe the role of Cybersecurity experts could prevent escalations and helps determining the responsible parties behind a cyber incident. We covered in this last module the following topics:
Ещё видео!